Issue Overview
Information Security magazine - October 2012In this issue, find out who won this year's Readers' Choice Awards. More than 2,100 readers participated this year, rating the best security products in 14 categories. The issue also features an article by Diana Kelley of SecurityCurve, who examines threat management best practices implemented at several enterprise organizations. SearchSecurity.com News Director Rob Westervelt analyzes the impact of hacktivists on the threat landscape, and we debut a new column by security experts at Iowa State University on security education and training. Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
2012 Readers' Choice Awards
For the seventh consecutive year, Information Security readers voted to determine the best security products. More than 2,000 voters participated this year, rating products in 14 different categories.
-
The hacktivist threat to enterprise security
by Robert Westervelt, News Director
With their goal of damaging corporate reputations, hacktivists aren't your average cybercriminals.
-
2012 Readers' Choice Awards
-
-
Threat prevention techniques: Best practices for threat management
by Diana Kelley, Contributor
A successful threat management program requires effective processes, layered technology and user education.
-
Malware trends: The rise of cross-platform malware
by Moriah Sargent
Security researchers are finding more malware that attacks multiple operating systems.
-
Threat prevention techniques: Best practices for threat management
by Diana Kelley, Contributor
-
Columns
-
Big data issues: Big data analytics offers both rewards and risks
by Steve Durbin, Contributor
Companies are under pressure to take advantage of big data analytics but they should be aware of the risks.
-
The bolt-on information security trend needs to end
by Doug Jacobson and Julie A. Rursch
Unless security is viewed as a core function instead of an add-on, we're bound to repeat the mistakes of the past.
-
Java security problems: Is disabling Java the answer?
by Marcia Savage, Editor
In the wake of recent exploits, experts recommend disabling the programming language but that can be tricky in the enterprise.
-
Big data issues: Big data analytics offers both rewards and risks
by Steve Durbin, Contributor
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO